Category / Blog
Qualcomm chips and security for OEMs
If you’re familiar with programmable read-only memory (PROM) or one-time programmable non-volatile memory (OTP NVM) then understanding the concept of qfusing on Qualcomm MSM chips should be trivial. For those who are not familiar, briefly speaking, Qualcomm uses OTP NVM for their security architecture in their modem chips. In layman’s terms, Qualcomm implemented a security…
Assumption versus Hypothesis
This is a fairly basic principle in PM, but the two are often confused so I would like to discuss them in detail. I’ll start with assumptions. Assumptions simplify complex problems. Making assumptions is a core role of a product manager. Product managers make assumptions about users (customers), human behavior, context, psychology, cognitive bias, etc.…
[Programming] N-queens problem using Haskell
If you’re reading this blog, you’re most likely familiar with the famous N-queens problem. If not, here it is! The eight queens puzzle is the problem of placing eight chessqueens on an 8×8 chessboard so that no two queens threaten each other. Thus, a solution requires that no two queens share the same row, column,…
Random Integer Interview Question
Note: This post is also on my blog with my fellow programmers Eric and Young. It’s called YES Programming, using our initials. Check it out if you have time! Hello! Sang checking-in. Here’s an interesting problem I found: Given a function which produces a random integer in the range 1 to 5, write a function…